CVE-2026-3342
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with administrative access to the WatchGuard Fireware OS to run any code they want with full control over the system. It affects specific versions of the software and requires the attacker to be logged in as a privileged administrator to exploit it.
Technical Description
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow an authenticated privileged administrator to execute arbitrary code with root permissions via an exposed management interface. This vulnerability affects Fireware OS 11.9 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.7 and 2025.1 up to and including 2026.1.1.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 4, 2026
about 1 month ago
Vendor
watchguard
Product
fireware
Related Vulnerabilities
An attacker can exploit a flaw in WatchGuard Fireware OS to bypass security checks on the system's files, allowing them to install a malicious firmware update that can maintain limited control over the device. This vulnerability affects specific versions of Fireware OS and requires the attacker to craft a specially designed firmware package to take advantage of it.
An attacker can trick an authenticated management user of Fireware OS into executing harmful JavaScript by clicking on a specially crafted link, potentially compromising their session or stealing sensitive information. This vulnerability affects specific versions of Fireware OS and requires the user to be logged in to the management interface when they click the link.